Cyber Security News

Over 19 Million Password Logs Sold on the Dark Web and Telegram

The rapid increase of info stealers has emerged as a major risk for organizations, including chatGPT, and has led to a rise in cybercrime in the last three years.

These info stealers are sold on malware-as-a-service platforms by threat actors and distributed through phishing emails and other software to steal credentials and personal information.

According to Flare research on more than 19.6 million stealer logs, 1.91%of stealer logs have access to credentials for business applications.

Ads published

The stealer logs access to banking and retired portal applications can be fetched from high prices on the Genesis market.

Stealer Logs With Login Credentials

From the analysis they have discovered that 2,00,000 stealer logs contain access to open AI credentials.

Additionally, 46.9% of stealer logs contained access to Gmail accounts and that shows 8 million infected devices.

For better understanding, Flare has classified stealer logs into three categories such as corporate credentials, financial services, and consumer applications.

Corporate credentials include RDP, SAAS, and other devices of the organization. Since the employees access corporate services from their devices, this increases the risk.

These corporate credentials have high value in illicit markets and are sold in dark web markets.

Financial and banking service logs are also high value and can be fetched at an average price of $112 from the Genesis market.

And these consumer application logs are sold at publicly available telegram channels starting from a price range of $10 to several hundred dollars.

Also, logs are sold at a dark web marketplace known as the Russian market specializes in selling device information as well as at the Genesis market.

Access Graph

They also found around 179411 logs of AWS console credentials and  2344 google cloud credentials.

These are related to student accounts who registered on AWS and Cloud for research purposes.

Also, research revealed that 64548 docusign and 15591 quick books logs contain access and  23267 salesforce account, 42873 Hubspot, and 66050 CRM.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Sujatha

Sujatha is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under her belt in Cyber Security, she is covering Cyber Security News, technology and other news.

Recent Posts

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…

1 hour ago

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

16 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

17 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

18 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

18 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

19 hours ago